Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document.
Note: Even the most advanced machine translation cannot match the quality of professional translators.
Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).

About This Document

About This Document

Purpose

This document provides the basic
concepts, configuration procedures, and configuration examples in
different application scenarios of the Wan Access feature supported
by the NE40E.

Related Version

The following
table lists the product version related to this document.

Product Name

Version

NE40E Series

V800R010C00

U2000

V200R017C60

eSight

V300R009C00

Intended Audience

This document is intended
for:

Data configuration engineers

Commissioning engineers

Network monitoring engineers

System maintenance engineers

Security Declaration

Encryption algorithm declaration

The encryption algorithms
DES/3DES/RSA (RSA-1024 or lower)/MD5 (in digital signature scenarios
and password encryption)/SHA1 (in digital signature scenarios) have
a low security, which may bring security risks. If protocols allowed,
using more secure encryption algorithms, such as AES/RSA (RSA-2048
or higher)/SHA2/HMAC-SHA2 is recommended.

Password configuration declaration

Do not set both the start and end characters of a password
to "%^%#". This causes the password to be displayed directly in the
configuration file.

To further improve device security, periodically change the
password.

Personal data declaration

Your purchased products, services,
or features may use users' some personal data during service operation
or fault locating. You must define user privacy policies in compliance
with local laws and take proper measures to fully protect personal
data.

Feature declaration

The NetStream feature may be used to
analyze the communication information of terminal customers for network
traffic statistics and management purposes. Before enabling the NetStream
feature, ensure that it is performed within the boundaries permitted
by applicable laws and regulations. Effective measures must be taken
to ensure that information is securely protected.

The mirroring feature may be used to analyze the communication information
of terminal customers for a maintenance purpose. Before enabling the
mirroring function, ensure that it is performed within the boundaries
permitted by applicable laws and regulations. Effective measures must
be taken to ensure that information is securely protected.

The packet header
obtaining feature may be used to collect or store some communication
information about specific customers for transmission fault and error
detection purposes. Huawei cannot offer services to collect or store
this information unilaterally. Before enabling the function, ensure
that it is performed within the boundaries permitted by applicable
laws and regulations. Effective measures must be taken to ensure that
information is securely protected.

Reliability design declaration

Network planning and site
design must comply with reliability design principles and provide
device- and solution-level protection. Device-level protection includes
planning principles of dual-network and inter-board dual-link to avoid
single point or single link of failure. Solution-level protection
refers to a fast convergence mechanism, such as FRR and VRRP.

Special Declaration

This document serves only as a guide. The content is written
based on device information gathered under lab conditions. The content
provided by this document is intended to be taken as general guidance,
and does not cover all scenarios. The content provided by this document
may be different from the information on user device interfaces due
to factors such as version upgrades and differences in device models,
board restrictions, and configuration files. The actual user device
information takes precedence over the content provided by this document.
The preceding differences are beyond the scope of this document.

The maximum values provided in this document are obtained in
specific lab environments (for example, only a certain type of board
or protocol is configured on a tested device). The actually obtained
maximum values may be different from the maximum values provided in
this document due to factors such as differences in hardware configurations
and carried services.

Interface numbers used in this document are examples. Use the
existing interface numbers on devices for configuration.

The pictures of hardware in this document are for reference
only.

Symbol Conventions

The symbols
that may be found in this document are defined as follows.

Symbol

Description

Indicates an imminently hazardous situation which, if not
avoided, will result in death or serious injury.

Indicates a potentially hazardous situation which, if not
avoided, could result in death or serious injury.

Indicates a potentially hazardous situation which, if not
avoided, may result in minor or moderate injury.

Indicates a potentially hazardous situation which, if not
avoided, could result in equipment damage, data loss, performance
deterioration, or unanticipated results.

NOTICE is used to
address practices not related to personal injury.

Calls attention to important information, best practices
and tips.

NOTE is used to address information not related to
personal injury, equipment damage, and environment deterioration.

Command Conventions

The command conventions that may be found in this document are
defined as follows.

Convention

Description

Boldface

The keywords of a command line are in boldface.

Italic

Command arguments are in italics.

[ ]

Items (keywords or arguments) in brackets [ ] are optional.

{ x | y | ... }

Optional items are grouped in braces and separated by vertical
bars. One item is selected.

[ x | y | ... ]

Optional items are grouped in brackets and separated by
vertical bars. One item is selected or no item is selected.

{ x | y | ... }*

Optional items are grouped in braces and separated by vertical
bars. A minimum of one item or a maximum of all items can be selected.

[ x | y | ... ]*

Optional items are grouped in brackets and separated by
vertical bars. Several items or no item can be selected.

&<1-n>

The parameter before the & sign can be repeated 1 to
n times.

#

A line starting with the # sign is comments.

Change History

Updates between
document issues are cumulative. Therefore, the latest document issue
contains all updates made in previous issues.

Changes in Issue 03 (2018-04-10)

This issue is the third official release. The software version of
this issue is V800R010C00SPC200.

Changes in Issue 02 (2018-02-28)

This issue is the second official release. The software version of
this issue is V800R010C00SPC200.

Changes in Issue 01 (2017-11-30)

This issue is the first official release. The software version of
this issue is V800R010C00SPC100.